The CIA is hunting for an insider who gave top-secret files to WikiLeaks

The CIA is hunting for an insider who gave top-secret files to WikiLeaks

The Central Intelligence Agency has launched a manhunt for a traitor within its ranks, after what has been known as one the worst security breaches in the organization’s history, CBS News reported on Wednesday.

A joint investigation of the CIA and the FBI is underway to examine how thousands of top-secret files were published in March by WikiLeaks, the controversial organization that releases classified material, by an alleged CIA employee or contractor who operated a tool normally used by the CIA to infiltrate various electronic devices — from smart phones, smart televisions, and computers.

The breach has been referred as “Vault 7” by WikiLeaks.

The CIA did not state publicly how or when the information was stolen. However, it said that the insider had physical access to obtain the files, and that most of it was stored in a “highly secure section,” CBS reported. 

CIA director Mike Pompeo recently slammed WikiLeaks for playing a role in the dissemination of the files.

“It is time to call out WikiLeaks for what it really is: A non-state hostile intelligence service often abetted by state actors like Russia,” he said, referring to the organization’s possible ties to the Kremlin.

Pompeo continued to rail against WikiLeaks and its founder Julian Assange, asserting that the Russian military “had used WikiLeaks” to release the Democratic National Committee’s emails that has since fueled allegations of Russia’s involvement in the 2016 US presidential election. He also added that RT, a media network from Russia that has offices in the US, was “Russia’s primary propaganda outlet,” and that it “has actively collaborated with WikiLeaks,” according to The Wall Street Journal.

The organization itself has been reluctant to release its source. “The archive appears to have been circulated among former US government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive,” read a statement.

Join the conversation about this story »

NOW WATCH: Russia jailed the man who may become Putin’s biggest challenger in the next election

WikiLeaks will give tech giants CIA zero-day exploits after they meet mystery demands

WikiLeaks will give tech giants CIA zero-day exploits after they meet mystery demands

 WikiLeaks doesn’t ever make things easy. When it became clear that the organization possessed documents that detail exploits affecting a handful of major tech companies, it looked like Julian Assange would play nice. Now, a week has passed since Assange said he would disclose information about those vulnerabilities to the companies affected — standard practice for the discovery… Read More

WikiLeaks Reveals CIA’s Secret Hacking Tools and Spy Operations

WikiLeaks Reveals CIA’s Secret Hacking Tools and Spy Operations

Mark Wilson, writing for BetaNews: WikiLeaks has unleashed a treasure trove of data to the internet, exposing information about the CIA’s arsenal of hacking tools. Code-named Vault 7, the first data is due to be released in serialized form, starting off with “Year Zero” as part one. A cache of over 8,500 documents and files has been made available via BitTorrent in an encrypted archive. The plan had been to release the password at 9:00am ET today, but when a scheduled online press conference and stream came “under attack” prior to this, the password was released early. Included in the “extraordinary” release are details of the zero day weapons used by the CIA to exploit iPhones, Android phones, Windows, and even Samsung TVs to listen in on people. Routers, Linux, macOS — nothing is safe. WikiLeaks explains how the “CIA’s hacking division” — or the Center for Cyber Intelligence (CCI) as it is officially known — has produced thousands of weaponized pieces of malware, Trojans, viruses and other tools. It’s a leak that’s essentially Snowden 2.0.

Read more of this story at Slashdot.

WikiLeaks proposes database of verified Twitter users’ info, sparks uproar

WikiLeaks proposes database of verified Twitter users’ info, sparks uproar

Wikileaks sparked an online firestorm on Friday when they tweeted that they were considering making an “online database” of Twitter’s verified users— those accounts that have a little blue and white check mark next to their names.
The controversial tweet mentioned that personal information, like “family/job/financial/housing relationships” could be part of the proposed database. It has subsequently been deleted.

 Wikileaks has since seemed to walk back the idea in response to a slew of outraged tweets and press. (Some were concerned about “doxxing,” which is a term that means to publish personal information online.) “As we stated the idea is to look at the network of *relationships* that influence — not to publish addresses,” the organization wrote on Twitter hours later.
 That tweet spurred Kevin Collier, a reporter with the website Vocativ (and a verified Twitter user), to ask the Wikileaks account via Twitter: “why collect living relationship, period? What could that show? That roommates, or living w/family/spouse, influences worldview?”

Verified Twitter accounts run the gamut from belonging to journalists and journalistic organizations, celebrities like Justin Bieber, politicians like Donald Trump and Barack Obama, the official Twitter account for companies like SpaceX or Google, or the account of Jack Dorsey, Twitter’s CEO. They exist, according to Twitter, as a way of letting people know that the account is “authentic”– that the tweets do indeed come from the real Justin Bieber, for example.
Dorsey, amidst the Wikileaks firestorm, tweeted out a link to Twitter’s privacy policy:

Other tweets from Wikileaks on Friday called the press “dishonest” or pointed at Wikipedia as an example of the type of information already publicly available.

Jason Mollica, a social media analyst who owns JRM Comms, said that people should be concerned by what Wikileaks wrote.
“If Wikileaks wants to do what many social media analysts already do, which is follow and monitor influencers, then it’s not really surprising,” Mollica wrote in an email to “However, taking the next step, in sharing it with other verified users, violates Twitter’s policies.”
Wikileaks has a history of publishing private information, and Mollica said they may continue that trend in the future.
“Since many journalists are verified on Twitter, it can be assumed that Wikileaks is looking to gather information on them,” he added. “In the now-deleted post, Wikileaks called out the media/press as ‘dishonest.’ And what ‘network of relationships’ are they looking at? It’s a harrowing threat and in this age of social media and sharing of information, should be alarming to many.”
At this point, it’s unclear if a database as described by Friday’s Wikileaks tweet will ever materialize.

Visit Us On LinkedinVisit Us On Google PlusVisit Us On TwitterVisit Us On Facebook